Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2023.4591.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2023:4591-1)
Summary:The remote host is missing an update for the 'squashfs' package(s) announced via the SUSE-SU-2023:4591-1 advisory.
Description:Summary:
The remote host is missing an update for the 'squashfs' package(s) announced via the SUSE-SU-2023:4591-1 advisory.

Vulnerability Insight:
This update for squashfs fixes the following issues:

- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
able to write a file outside the destination directory via a
symlink (bsc#1190531).

update to 4.6.1:

* Race condition which can cause corruption of the 'fragment
table' fixed. This is a regression introduced in August 2022,
and it has been seen when tailend packing is used (-tailends option).
* Fix build failure when the tools are being built without
extended attribute (XATTRs) support.
* Fix XATTR error message when an unrecognised prefix is
found
* Fix incorrect free of pointer when an unrecognised XATTR
prefix is found.
* Major improvements in extended attribute handling,
pseudo file handling, and miscellaneous new options and
improvements
* Extended attribute handling improved in Mksquashfs and
Sqfstar
* New Pseudo file xattr definition to add extended
attributes to files.
* New xattrs-add Action to add extended attributes to files
* Extended attribute handling improved in Unsquashfs
* Other major improvements
* Unsquashfs can now output Pseudo files to standard out.
* Mksquashfs can now input Pseudo files from standard in.
* Squashfs filesystems can now be converted (different
block size compression etc) without unpacking to an
intermediate filesystem or mounting, by piping the output of
Unsquashfs to Mksquashfs.
* Pseudo files are now supported by Sqfstar.
* 'Non-anchored' excludes are now supported by Unsquashfs.

update to 4.5.1 (bsc#1190531, CVE-2021-41072):

* This release adds Manpages for Mksquashfs(1), Unsquashfs(1),
Sqfstar(1) and Sqfscat(1).
* The -help text output from the utilities has been improved
and extended as well (but the Manpages are now more
comprehensive).
* CVE-2021-41072 which is a writing outside of destination
exploit, has been fixed.
* The number of hard-links in the filesystem is now also
displayed by Mksquashfs in the output summary.
* The number of hard-links written by Unsquashfs is now
also displayed in the output summary.
* Unsquashfs will now write to a pre-existing destination
directory, rather than aborting.
* Unsquashfs now allows '.' to used as the destination, to
extract to the current directory.
* The Unsquashfs progress bar now tracks empty files and
hardlinks, in addition to data blocks.
* -no-hardlinks option has been implemented for Sqfstar.
* More sanity checking for 'corrupted' filesystems, including
checks for multiply linked directories and directory loops.
* Options that may cause filesystems to be unmountable have
been moved into a new 'experts' category in the Mksquashfs
help text (and Manpage).
* Maximum cpiostyle filename ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'squashfs' package(s) on SUSE Linux Enterprise Server 15-SP3, SUSE Linux Enterprise Server for SAP Applications 15-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-4645
BugTraq ID: 75272
http://www.securityfocus.com/bid/75272
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162171.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162226.html
https://security.gentoo.org/glsa/201701-73
https://github.com/devttys0/sasquatch/pull/5
Common Vulnerability Exposure (CVE) ID: CVE-2015-4646
http://seclists.org/oss-sec/2015/q2/756
Common Vulnerability Exposure (CVE) ID: CVE-2021-40153
Debian Security Information: DSA-4967 (Google Search)
https://www.debian.org/security/2021/dsa-4967
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/
https://security.gentoo.org/glsa/202305-29
https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
https://github.com/plougher/squashfs-tools/issues/72
https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-41072
Debian Security Information: DSA-4987 (Google Search)
https://www.debian.org/security/2021/dsa-4987
https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
https://lists.debian.org/debian-lts-announce/2021/10/msg00017.html
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.